1) The document provides steps for becoming invisible online by removing traces of one's digital identity and past activities from search engines and social media profiles.
2) It discusses auditing what information is publicly available about oneself, deactivating or removing content from platforms like Facebook, LinkedIn, and criminal record sites.
3) The document also offers tips for cleaning up an individual's online reputation through search engine removal requests, running marketing campaigns against one's own name, and purging traces from old social networks and communities.
Jobhunting and the Absence of Online PrivacyJim Stroud
This presentation explains the importance of your online reputation, how to build it and how to protect it. Use the tips in this presentation to take your job hunting to the next level. And please, do pass it on to others that could use the advice.
Search & Social for Personal Branding - Presentation by Carol Cox & Rob CrollRob Croll
Carol Cox & Rob Croll, Course Directors in the Internet Marketing Program at Full Sail University, talked about 'Search & Social for Personal Branding' during a theater presentation at SMX West 2011 in San Jose.
A presentation I gave today (30/6/10) at the Futurising Conference in London on using social media for 'self promotion' or more specifically how you can use social tools to further your career. Note, most of the images click through to web pages.
People, who did not grow up in the Internet Age are often afraid to use Social Media in their Job Search. They either do not know enough about; can't see how it applies to finding a job; and often just plain fear it. This presentation is very basic and addresses most of these concerns. It's just enough, but not too much for older workers to understand and manage.
Your personal brand is an important part of building your career. Make sure your what you're doing on social media doesn't reflect against you negativity and hurt your brand.
Influencers prefer sharing content they find themselves. Here's how to break into their headspace with your brand and content without directly pitching them.
Jobhunting and the Absence of Online PrivacyJim Stroud
This presentation explains the importance of your online reputation, how to build it and how to protect it. Use the tips in this presentation to take your job hunting to the next level. And please, do pass it on to others that could use the advice.
Search & Social for Personal Branding - Presentation by Carol Cox & Rob CrollRob Croll
Carol Cox & Rob Croll, Course Directors in the Internet Marketing Program at Full Sail University, talked about 'Search & Social for Personal Branding' during a theater presentation at SMX West 2011 in San Jose.
A presentation I gave today (30/6/10) at the Futurising Conference in London on using social media for 'self promotion' or more specifically how you can use social tools to further your career. Note, most of the images click through to web pages.
People, who did not grow up in the Internet Age are often afraid to use Social Media in their Job Search. They either do not know enough about; can't see how it applies to finding a job; and often just plain fear it. This presentation is very basic and addresses most of these concerns. It's just enough, but not too much for older workers to understand and manage.
Your personal brand is an important part of building your career. Make sure your what you're doing on social media doesn't reflect against you negativity and hurt your brand.
Influencers prefer sharing content they find themselves. Here's how to break into their headspace with your brand and content without directly pitching them.
The dynamics of the digital world have forever changed the way we are perceived as professionals and human beings. Today, your reputation is not just about the carefully crafted persona you put forth in real life but how that lives, and is shared, online. A presentation on how to be authentic and have relevance while being aware of the pitfalls and considerations of our digital age.
Plagiarism-Proofing and Versatility in Assignments in BlackboardLance Eaton
A presentation on reducing plagiarism in student assignments through using Blackboard Learn as well as different assessment strategies.
Good tidings,
Lance
Lance Eaton
he/him/his
http://www.ByAnyOtherNerd.com
https://twitter.com/leaton01
https://www.linkedin.com/in/leaton01/
____________________
I wish I had all the answers; better yet, I wish I knew all the questions to ask.
You Can Run, But You Can't Hide! - How far should the government regulate the Internet? -Has data mining gone too far? (Great secondary research project.) Digital footprint makeover handouts available at: digitalmakeover.wikispaces.com Find ideas for classroom instruction, also, on this wikispace.
This presentation was a breakout session at WLMA14 and has been updated to reflect recent revelations on medical information mining. We did not even get to discuss the EDUCATIONAL DATA MINING that is occurring on our students and children! Caveat!
Moving Towards Insights-Driven StrategiesTara Hunt
There are lots of analytics you can pull when you are working with a large audience to determine what people like/don't like, but there is also a lot of behavioural/interest data that can be used to determine what they will respond to as you are planning your strategies. This presentation was given at Inbound 2015 in Boston (September 8-11).
Since the beginning of the social web, marketers have been trying to figure out what it is that creates buzz online? Is it that funny viral YouTube video? Witty real-time twitter banter? A big enough budget on that Facebook video? Kylie Jenner’s instagram?
Well, I’m going to tell you today that it is NONE of those things, but it’s also NOT rocket science.
The biggest factor that will determine how quickly something travels through a network is…
I guess you’ll just have to click through the presentation to find out.
This talk was given at Social Media Camp in Victoria, BC on May 7, 2016.
Solid tips for any archaeologist, cultural resource management professional, historic preservation specialist, or heritage conservation employee can land a job. This is the exact strategy I use to find work for myself and help other people get jobs. Here is a step-by-step method for landing jobs and creating work from the "hidden job market"
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
Ever wonder what you should or shouldn’t share on the internet? Do you see users who are posting everything thing they possibly could on the internet and wonder how to help educate them to protect themselves?
All of this collective sharing, creates a data gold mine for hackers to do their evil bidding. In this session we will talk about what to post on the internet and what not too. We will also look into what hackers can use from the information you’ve posted on the internet and how they can use it to gain access to your and your users personal lives, accounts, credit cards, and more. During this session, we’ll dive into building a strategy plan to help limit and hopefully eliminate these references from your digital footprint to help ensure you are more secure than you were when you first started this session.
By the end of this webinar, attendees will have a virtual toolkit and strategies to help educate users on protecting themselves while online.
Ever get the impression that Facebook, Twitter and the like are just "for the kids"? How about us old folks, you know, people over thirty. Can we get any value out of this social networking "stuff"? Sure we can. This presentation runs through some of "the stuff" (Facebook, Twitter, LinkedIN), and shares some considerations for using them in a safe, effective manner, whether it is to build and promote a strong personal brand online, maintain a strong personal and professional network, or all of the above.
Accuracy is fundamental to journalism, but it’s a challenge to verify information when it flows at digital warp speed from so many sources. This presentation offers specific tools, advice and strategies to master the art of online verification. Learn how to verify a tweet, evaluate if a website is credible and check the accuracy of your own work.
By Craig Silverman of the Poynter Institute and Regret the Error. @CraigSilverman
The dynamics of the digital world have forever changed the way we are perceived as professionals and human beings. Today, your reputation is not just about the carefully crafted persona you put forth in real life but how that lives, and is shared, online. A presentation on how to be authentic and have relevance while being aware of the pitfalls and considerations of our digital age.
Plagiarism-Proofing and Versatility in Assignments in BlackboardLance Eaton
A presentation on reducing plagiarism in student assignments through using Blackboard Learn as well as different assessment strategies.
Good tidings,
Lance
Lance Eaton
he/him/his
http://www.ByAnyOtherNerd.com
https://twitter.com/leaton01
https://www.linkedin.com/in/leaton01/
____________________
I wish I had all the answers; better yet, I wish I knew all the questions to ask.
You Can Run, But You Can't Hide! - How far should the government regulate the Internet? -Has data mining gone too far? (Great secondary research project.) Digital footprint makeover handouts available at: digitalmakeover.wikispaces.com Find ideas for classroom instruction, also, on this wikispace.
This presentation was a breakout session at WLMA14 and has been updated to reflect recent revelations on medical information mining. We did not even get to discuss the EDUCATIONAL DATA MINING that is occurring on our students and children! Caveat!
Moving Towards Insights-Driven StrategiesTara Hunt
There are lots of analytics you can pull when you are working with a large audience to determine what people like/don't like, but there is also a lot of behavioural/interest data that can be used to determine what they will respond to as you are planning your strategies. This presentation was given at Inbound 2015 in Boston (September 8-11).
Since the beginning of the social web, marketers have been trying to figure out what it is that creates buzz online? Is it that funny viral YouTube video? Witty real-time twitter banter? A big enough budget on that Facebook video? Kylie Jenner’s instagram?
Well, I’m going to tell you today that it is NONE of those things, but it’s also NOT rocket science.
The biggest factor that will determine how quickly something travels through a network is…
I guess you’ll just have to click through the presentation to find out.
This talk was given at Social Media Camp in Victoria, BC on May 7, 2016.
Solid tips for any archaeologist, cultural resource management professional, historic preservation specialist, or heritage conservation employee can land a job. This is the exact strategy I use to find work for myself and help other people get jobs. Here is a step-by-step method for landing jobs and creating work from the "hidden job market"
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
Ever wonder what you should or shouldn’t share on the internet? Do you see users who are posting everything thing they possibly could on the internet and wonder how to help educate them to protect themselves?
All of this collective sharing, creates a data gold mine for hackers to do their evil bidding. In this session we will talk about what to post on the internet and what not too. We will also look into what hackers can use from the information you’ve posted on the internet and how they can use it to gain access to your and your users personal lives, accounts, credit cards, and more. During this session, we’ll dive into building a strategy plan to help limit and hopefully eliminate these references from your digital footprint to help ensure you are more secure than you were when you first started this session.
By the end of this webinar, attendees will have a virtual toolkit and strategies to help educate users on protecting themselves while online.
Ever get the impression that Facebook, Twitter and the like are just "for the kids"? How about us old folks, you know, people over thirty. Can we get any value out of this social networking "stuff"? Sure we can. This presentation runs through some of "the stuff" (Facebook, Twitter, LinkedIN), and shares some considerations for using them in a safe, effective manner, whether it is to build and promote a strong personal brand online, maintain a strong personal and professional network, or all of the above.
Accuracy is fundamental to journalism, but it’s a challenge to verify information when it flows at digital warp speed from so many sources. This presentation offers specific tools, advice and strategies to master the art of online verification. Learn how to verify a tweet, evaluate if a website is credible and check the accuracy of your own work.
By Craig Silverman of the Poynter Institute and Regret the Error. @CraigSilverman
“Your brand is a story unfolding across all customer touch points.”
– Jonah Sachs
Succeeding in today’s job market requires a compelling personal story and a strategy behind it. Blue Ocean Strategy is about creating and capturing uncontested market space, thereby making the competition irrelevant.
In the workshop, Mo Moubarak presents ways to actively cultivate a sales mindset and utilize personal branding as a tool for creating your own Blue Ocean.
What makes some companies stand out when others blend with the crowd?
What is a brand vision and how does it work for individuals?
Who is your target audience?
How to remain authentic while creating a personal portrait?
A HillyBilly's Guide to Staying Anonymous Online - SecureWVAdam Compton
Online Privacy… I would imagine that most everyone has something they would not like to have shared with the entire Internet. For some, this may be because of their job; for others it is so they can hide from their previous life. Still others may do it as a way to limit their exposure to attack. During this talk we will discuss techniques of how to hide your personal data from the Internet by the creation of alternate online identities (a.k.a. Sock puppets).
Social Media is Okay - Jeopardizing Security Isn'tjordanwollman
In a world of hackers, phishers, scammers, and Nigerian Princes, how do you keep yourself and your clients safe, while investing time and energy (and not to forget, money) into Social Media.
An objective look at social media risks and benefits.
Pete Wiltjer co-presented at the Professional Skills Workshop on 'Using Social Media for Networking & Job Hunting', Oct. 16 @ Northwestern University's Kellogg Business School.
6. Why do you want to disappear?
Some good reasons:
• You’re in the market for a new job.
• Your parents and grandparents are getting better at the
internet and they’re starting to ask questions.
• You have a dark, lurid past.
• Let’s face it: you’re a deviant. But you want a clean start!
14. Let’s look at the places that HR departments, college
admissions, your next date, and your nosey friends and
family are using to see what you’ve been up to.
15.
16. Disclaimer: Let’s first acknowledge what Facebook is and
is not. With the exception of brand and journalist pages,
Facebook is a tool for connecting you to the people and
things you care most about. It’s personal, meaning that no
one should criticize your right to preserve the privacy of
what makes Facebook personal for you.
19. However, privacy changes or deactivation won’t
retroactively hide some types of Facebook debauchery.
Using Graph Search you should uncover any other
misdoings.
20.
21. Disclaimer: Determined people are never satisfied until
they’ve exhausted every avenue... They will create fake
profiles and maybe even feign the identity of someone who
you actually know in order to gain access to your inner-
circle.
Accept people with caution!
24. If you’re a human then it’s now expected of you to be on
LinkedIn.
• It’s indexed and highly weighted by Google
• If you’re in the market for a new job, this is HR’s first stop.
27. • Upload a photo of you not looking like a slob
• Pad your credentials
• Pepper in some interests like Cinéma vérité and Heli
Boarding
• Create fake LinkedIn peers to give you glowing
endorsements
• Sign up for a Pro account so people can see you’re super
serious
28. May or may not know your...
• Name
• Your current address
• Names of your family members
• How much you make
• Your education and occupation
36. If you’re lucky, you have an uncomplicated or
overused name.
Jonathan Hunt Jonathan Hunt Jonathan Hunt
Me Fox News Correspondent Dead to Fall vocalist
38. To find out if a name is dirty, run it through these tests:
Standard Search
• Use quotes for exact search, exclude words to
eliminate any false positives, and filter by geography
to catch any hyperlocal content
Semantic Image Search
• Dig deep in Google Images to find the remains of old
social profiles and mugshots
Search by Image
• Use a published photo of yourself to find other
instances of it online.
40. How to clean up:
• Contact the offending site.
• URL removal requests - Google, Bing, and Yahoo all offer
them.
• Reactivate all of your socials and wait for the search
engines to re-crawl and re-index.
• Run SEM campaigns against your name.